​
Login / Signup
Kun Lv
ORCID
Publication Activity (10 Years)
Years Active: 2006-2024
Publications (10 Years): 19
Top Topics
Discrimination Ability
Monte Carlo
Graph Search
Kohonen Neural Network
Top Venues
NSS
TrustCom/BigDataSE
SciSec
ICCCN
</>
Publications
</>
Fangting Li
,
Kun Lv
,
Xiaohua Liu
,
Yuqiao Zhou
,
Kai Liu
Accurately Computing the Interacted Volume of Molecules over Their 3D Mesh Models.
J. Chem. Inf. Model.
64 (14) (2024)
Kun Lv
,
Hui Ma
,
Xinrui Jiang
,
Jian Bai
,
Hongwei Liu
Micromotion Feature Extraction with VEMW Radar Based on Rotational Doppler Effect.
Remote. Sens.
15 (11) (2023)
Kun Lv
,
Yun Chen
,
Changzhen Hu
Dynamic defense strategy against advanced persistent threat under heterogeneous networks.
Inf. Fusion
49 (2019)
Yun Chen
,
Hui Xie
,
Kun Lv
,
Shengjun Wei
,
Changzhen Hu
DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks.
Inf. Sci.
501 (2019)
Hui Xie
,
Kun Lv
,
Changzhen Hu
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis.
TrustCom/BigDataSE
(2018)
Huihui Xie
,
Kun Lv
,
Changzhen Hu
An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets.
TrustCom/BigDataSE
(2018)
Jianhua Su
,
Bin Chen
,
Kun Lv
Computation of Caging Grasps of Objects using Multi-Task Learning Method.
ICARM
(2018)
Hui Xie
,
Kun Lv
,
Changzhen Hu
,
Chong Sun
A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis.
ICCCN
(2018)
Yun Chen
,
Kun Lv
,
Changzhen Hu
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments.
Secur. Commun. Networks
2018 (2018)
Zhengyuan Zhang
,
Kun Lv
,
Changzhen Hu
Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method.
SciSec
(2018)
Ningyuan Cao
,
Kun Lv
,
Changzhen Hu
An Attack Graph Generation Method Based on Parallel Computing.
SciSec
(2018)
Bin Chen
,
Jianhua Su
,
Kun Lv
,
Donge Xue
Estimation of 3-D Pose with 2-D Vision Based on Shape Matching Method.
ICONIP (6)
(2018)
Kun Lv
,
Jiafen Liu
,
Ping Tang
,
Qing Li
Keystroke Biometrics for Freely Typed Text Based on CNN model.
PACIS
(2018)
Hui Xie
,
Kun Lv
,
Changzhen Hu
A Partition Matching Method for Optimal Attack Path Analysis.
ISPA/IUCC/BDCloud/SocialCom/SustainCom
(2018)
Changjian Deng
,
Kun Lv
,
Debo Shi
,
Bo Yang
,
Song Yu
,
Zhiyi He
,
Jia Yan
Enhancing the Discrimination Ability of a Gas Sensor Array Based on a Novel Feature Selection and Fusion Framework.
Sensors
18 (6) (2018)
Chong Sun
,
Kun Lv
,
Changzhen Hu
,
Hui Xie
A Double-Layer Detection and Classification Approach for Network Attacks.
ICCCN
(2018)
Yun Chen
,
Kun Lv
,
Changzhen Hu
Optimal Attack Path Generation Based on Supervised Kohonen Neural Network.
NSS
(2017)
Hao Zhang
,
Kun Lv
,
Changzhen Hu
An Automatic Vulnerabilities Classification Method Based on Their Relevance.
NSS
(2017)
Yukun Zheng
,
Kun Lv
,
Changzhen Hu
A Quantitative Method for Evaluating Network Security Based on Attack Graph.
NSS
(2017)
Tianmiao Wang
,
Kun Lv
,
Baoqing Pei
,
Li Zhou
Research of FNF Internal Fixation Operation Parametric Planning and Evaluation System.
ROBIO
(2006)